• Title/Summary/Keyword: possession

Search Result 555, Processing Time 0.028 seconds

A Balance of Primary and Secondary Values: Exploring a Digital Legacy

  • Cushing, Amber L.
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.3 no.2
    • /
    • pp.67-94
    • /
    • 2013
  • This exploratory research explores the concept of a digital legacy as a general concept and as a collection of digital possessions with unique characteristics. The results reported in this article are part of a larger study. In Cushing (2013), the author identified the characteristics of a digital possession. In this study, these characteristics of a digital possession were utilized to explore how the characteristics of several digital possessions could form a collection, or a digital legacy. In addition to being explored as a collection of digital possessions, data was collected about the general concept of a digital legacy. In part I of the study, 23 participants from three age groups were interviewed about their general concept of a digital legacy. Five general characteristics describing a digital legacy were identified. In part II of the study, interview data from Cushing (2013) was used to create statements describing digital possessions. The statements were classified utilizing the archival concept of primary and secondary values, as well as the consumer behavior concepts of self extension to possessions and possession attachment. Primary value refers to the purpose for which the item was created, while secondary value refers to an additional value that the participants can perceive the item to hold, such as a perception that an item can represent one's identity. Using standard Q method procedure, 48 participants were directed to rank their agreement with 60 statements (written on cards), along a distribution of -5 to +5, according to the characteristics of the digital possession they would most like to maintain for a digital legacy. The ranked statements were analyzed using Q factor analysis, in order to perceive the most common statements associated with maintaining digital possessions for a digital legacy. Q method results suggested that most individuals described the digital possessions they wanted to maintain for a digital legacy using various combinations of characteristics associated with primary and secondary values. This suggests that while some participants will respond to personal archiving based on the concept of preserving identity (a perceived secondary value), this will not appeal to everyone. Information professional could consider this difference in appeal when marketing personal archiving assistance to patrons.

The Effect of Materialism and Conspicuous Consumption on Purchase of Fashion Luxury Goods and Counterfeits (물질주의와 과시적 소비성향이 패션 명품과 복제품 구매에 미치는 영향)

  • Park, Hye-Sun
    • Korean Journal of Human Ecology
    • /
    • v.16 no.1
    • /
    • pp.103-110
    • /
    • 2007
  • The purposes of this study were to investigate the effect of materialism and conspicuous consumption on purchase of fashion luxury goods and counterfeits, and demographic variables' effect on these fashion purchase behaviors. For this study, 386 women aged over 20 were surveyed. The data were analyzed with frequency, factorial analysis, multiple regression analysis, ANOVA, etc., using the SPSS 10.0. The results of this study included; 1) The materialism was divided three factors: 'Pursuing of Happiness', 'Pursuing of Possession' and 'Disinterest of Possession'. 2) The conspicuous consumption was divided two factors: 'Pursuing of Recognition' and 'Pursuing of Fashion'. 3) The purchasing of fashion luxury goods was positively affected by 'Pursuing of Recognition' and 'Pursuing of Fashion' which were the conspicuous consumption factors. And the purchase of fashion counterfeits was affected positively by 'Pursuing of Happiness' and 'Disinterest of Possession', which were the materialism factors, and by 'Pursuing of Fashion', which was the conspicuous consumption factor. And 4) Age and income affected the purchase of fashion luxury goods and counterfeits.

A Study on Copyright Possession for Open Access and Archiving of Scholarly Journal Paper Registered in Korean Research Foundation (국내 학술지 논문의 오픈 액세스와 아카이빙을 위한 저작권 귀속 연구 - 한국학술진흥재단 등재 학술지를 중심으로 -)

  • Hong, Jae-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.39 no.1
    • /
    • pp.431-463
    • /
    • 2008
  • Scholarly journal is the important media of the scholarly communication and the representative noncommercial works which aim the openness and the share of the scholarly information. Recently the concern about the open access movement of the scholarly journal is increasing in Korea. However, the copyright issues are becoming the big obstacle of the open access and the archiving of the scholarly journal paper. This study investigated the copyright dispute examples of the scholarly journal paper and analyzed the present conditions on the copyright possession of 906 scholarly journals registered in Korean Research Foundation. On the basis of the result, the paper proposed the concrete copyright plan for the open access and the archiving of the scholarly journal paper in Korea.

  • PDF

A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4576-4598
    • /
    • 2018
  • In big data age, flexible and affordable cloud storage service greatly enhances productivity for enterprises and individuals, but spontaneously has their outsourced data susceptible to integrity breaches. Provable Data Possession (PDP) as a critical technology, could enable data owners to efficiently verify cloud data integrity, without downloading entire copy. To address challenging integrity problem on multiple clouds for multiple owners, an identity-based batch PDP scheme was presented in ProvSec 2016, which attempted to eliminate public key certificate management issue and reduce computation overheads in a secure and batch method. In this paper, we firstly demonstrate this scheme is insecure so that any clouds who have outsourced data deleted or modified, could efficiently pass integrity verification, simply by utilizing two arbitrary block-tag pairs of one data owner. Specifically, malicious clouds are able to fabricate integrity proofs by 1) universally forging valid tags and 2) recovering data owners' private keys. Secondly, to enhance the security, we propose an improved scheme to withstand these attacks, and prove its security with CDH assumption under random oracle model. Finally, based on simulations and overheads analysis, our batch scheme demonstrates better efficiency compared to an identity based multi-cloud PDP with single owner effort.

Determinants of Food Management Behavior of Housewives in Island Areas -Comparison between Hansan and Ullung Island- (도서 지역 주부의 식생활 관리 태도에 영향을 미치는 요인 -한산도와 울릉도 지역을 중심으로-)

  • 박영선
    • Journal of the Korean Home Economics Association
    • /
    • v.38 no.3
    • /
    • pp.131-147
    • /
    • 2000
  • The purpose of this study was to identify food management behavior of housewives in island areas and to find if the behavior patterns were different between the regions, Hansan and Ullung island. An instalment based on previous researches was designed to measure food management behavior and was administered to 274 housewives in 1994 and 1998. Considering the condition of cooking-equipment possession, the percentage of possession for refrigerator, mix, electric range were significantly higher for households in Hansan Island than their counterparts. For food-budget planning, those in Ullung Island were more likly to plan their budget than those in Hansan Island. Menu planning patterns, considerable factors for food selection as well as cooking, and eating habits between meals were tuned out to be different between Hansan and Ullung areas. The findings of this study suggest that the condition of cooking-equipment possession, food-budget and menu planning, considerable factors for food selection and cooking, eating habits between meals were likely to vary depending on regions. Although housewives in two areas were living in island, they were not necessarily be uniform for all households but were diversified in food management behavior. Half of the respondents in Hansan Island and three-forth of the respondents in Ullung Island reported they had not planned their meal budget. The percentage of those who did not have their planned menu was 52.7∼54.1% in Hansan Island and 37.1∼38.5% in Ullung Island. When purchasing food material, housewives in Hansan Island consider the seasoning food as the most important factor, whereas those in Ullung Island consider family preference as the most important factor

  • PDF

Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation

  • Nithya, S. Mary V.;Rhymend Uthariaraj, V.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3322-3347
    • /
    • 2021
  • Cloud Storage is the primary component of many businesses on cloud. Majority of the enterprises today are adopting a multicloud strategy to keep away from vendor lock-in and to optimize cost. Auditing schemes are used to ascertain the integrity of cloud data. Of these schemes, only the Provable Data Possession schemes (PDP) are resilient to key-exposure. These PDP schemes are devised using Public Key Infrastructure (PKI-) based cryptography, Identity-based cryptography, etc. PKI-based systems suffer from certificate-related communication/computational complexities. The Identity-based schemes deal with the exposure of only the auditing secret key (audit key). But with the exposure of both the audit key and the secret key used to update the audit key, the auditing process itself becomes a complete failure. So, an Identity-based PDP scheme with Parallel Key-Insulation is proposed for multiple cloud storage. It reduces the risk of exposure of both the audit key and the secret key used to update the audit key. It preserves the data privacy from the Third Party Auditor, secure against malicious Cloud Service Providers and facilitates batch auditing. The resilience to key-exposure is proved using the CDH assumption. Compared to the existing Identity-based multicloud schemes, it is efficient in integrity verification.

Differences in Reactions to Sales Promotions: Superior or Inferior to Your Product?

  • Kim, Chang Soo;Jo, Myung-Soo
    • Asia Marketing Journal
    • /
    • v.15 no.2
    • /
    • pp.99-116
    • /
    • 2013
  • This study examines whether product promotions are influenced by the market standing of promoted products, using social comparison theory (upward versus downward comparisons). It is hypothesized that people in possession of a product that is inferior to the one on promotion express less discomfort about the promotion and use the information more than do people in possession of a superior product. People in possession of an inferior product may also exhibit more positive attitudes toward the product on promotion, but may show poorer attitudes toward their own possessed product than do people with a superior product. This is because people in an inferior socioeconomic position show a strong motivation to improve themselves through upward social comparison, whereas people in a superior socioeconomic position maintain a strong sense of superiority in downward social comparison, which suggests strong endowment effects. The findings mainly support the hypotheses, and suggest that sales promotions are more effective for people who currently own an inferior product, but not for people with a superior product, who have a strong motivation to maintain their sense of superiority. The findings also imply that, in order to attract consumers in the superior market, managers for inferior products need to turn to methods other than sales promotions, which may include introducing a new brand or sub-brand, or emphasizing luxury and modern features. In contrast, managers for superior products may emphasize product functions and attributes of superior products in their promotions, as people with inferior products may consider such information as benefits of the superior products.

  • PDF

The Value of the Good Faith of the Occupier for Acquiring the Right of Ownership by Limitation of Possession

  • Guyvan, Petro
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.57-64
    • /
    • 2022
  • This scientific article is devoted to the study of the legal significance of such a category of legal status of the purchaser of another's thing, as its good faith. The essence of this phenomenon has been studied, it has been established that the criterion of good faith attaches significant importance to the claims of the participants of these relations for the acquisition or preservation of private property rights. The paper emphasizes that, in addition to the importance of good conscience at the time of possession of another's thing, which gives legal certainty the possibility of registration of the title and is part of the actual composition for the acquisition of property or the right of ancient possession, bona fides also characterizes the behavior of the occupier. In this case, good conscience only has some legal consequences when it is opposed to subjective law. Under such conditions, it acquires direct legal significance, including as a condition for the acquisition and protection of rights. Good faith possession of another's property is an internal indicator of the subject's awareness of a certain property status. This sense, the article assesses this status from the standpoint of the scientific concept of the visibility of law. According to this theory, prescription is also considered as a consequence of the appearance of law, however, because it arises and lasts against the will of the parties and despite their awareness of this fact. Therefore, bona fide continuous and open possession of property as one's own, during the acquisition period, was most significantly associated with the appearance of property. Therefore, the concept of good faith, in the sense of personal perception of real values, is closely related to the principle of protection of the appearance of law, as it is aimed at understanding it by third parties. The paper notes certain differences in the application of the theory of the appearance of the right in the acquisition of property by a bona fide purchaser from an unauthorized alienator and the acquisitive prescription. It is emphasized that such a mechanism must be used in presuming the attitude to the thing as its own, by the holder of movable property. But there should be exceptions to the rule, in particular, if the owner has grounds for vindication of the thing.